Static task
static1
Behavioral task
behavioral1
Sample
fc82b601db7bf8b645a4210589aa867afdcce51a57c3e4b97af454dc2c2e9e3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc82b601db7bf8b645a4210589aa867afdcce51a57c3e4b97af454dc2c2e9e3c.exe
Resource
win10v2004-20220812-en
General
-
Target
fc82b601db7bf8b645a4210589aa867afdcce51a57c3e4b97af454dc2c2e9e3c
-
Size
816KB
-
MD5
c1774876a92f97659b737d6615019a52
-
SHA1
a7ef1d187dd4aaf109ceb3e7d2a1b5b7f5e8075c
-
SHA256
fc82b601db7bf8b645a4210589aa867afdcce51a57c3e4b97af454dc2c2e9e3c
-
SHA512
77230b82a559a35bb2c2846d11912ed62cd728472e193258963065fa5e78b5edf4da294bee5c85c84bd3bccc7720dba30d66de29754f1a470eab9fbee897768e
-
SSDEEP
12288:DRlOUSZpa7Qn5hPx4O93Is1KfxECNeIJyEy+kQxwwnas4e5zCH:DCacnW23Is1KfxVNeI0Ey+HmwaTe5+H
Malware Config
Signatures
Files
-
fc82b601db7bf8b645a4210589aa867afdcce51a57c3e4b97af454dc2c2e9e3c.exe windows x86
fca77154e57c62dfd349b6a1804e06ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
URLDownloadToCacheFileA
wininet
InternetSetOptionA
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
shell32
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHGetDesktopFolder
kernel32
WriteFile
GetLocalTime
SetFilePointer
CreateFileA
CloseHandle
GetModuleFileNameA
GetTempPathA
lstrlenA
LoadLibraryA
GlobalAddAtomA
WaitForSingleObject
ExpandEnvironmentStringsA
LoadLibraryExA
GetPrivateProfileStringA
GetSystemDirectoryA
GlobalFindAtomA
TerminateThread
CreateThread
GetDriveTypeA
GetLogicalDrives
CopyFileA
DeleteFileA
SetLastError
FindClose
RaiseException
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
IsDBCSLeadByte
GetModuleHandleA
ReleaseMutex
SetPriorityClass
GetCurrentProcess
CreateMutexA
SetThreadLocale
GetThreadLocale
GetACP
SetErrorMode
InterlockedExchange
GetVersion
CompareStringA
RemoveDirectoryA
WaitForMultipleObjects
GetDiskFreeSpaceExA
ReadFile
GetConsoleMode
GetStdHandle
WriteConsoleA
GetFileAttributesA
GetTempFileNameA
OutputDebugStringA
GetFileSize
FindNextFileA
SetFileAttributesA
FindFirstFileA
GetWindowsDirectoryA
GetVersionExA
HeapFree
HeapAlloc
GetProcessHeap
FormatMessageA
VerifyVersionInfoA
VerSetConditionMask
lstrcpyA
OpenProcess
GetExitCodeProcess
TerminateProcess
CreateProcessA
GetShortPathNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
DeviceIoControl
GetFullPathNameA
GetSystemDefaultLangID
GetSystemTime
MoveFileA
SetEnvironmentVariableA
GetVolumeInformationA
DeleteAtom
AddAtomA
SystemTimeToFileTime
MoveFileExA
GlobalAlloc
GlobalFree
lstrcmpA
LocalFileTimeToFileTime
IsBadReadPtr
GetCurrentDirectoryA
DuplicateHandle
SetFileTime
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
FlushFileBuffers
WaitNamedPipeA
GetSystemWindowsDirectoryA
GetTickCount
FileTimeToSystemTime
CreateDirectoryA
SystemTimeToTzSpecificLocalTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetStartupInfoA
GetCommandLineA
SetEndOfFile
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetCurrentThreadId
ExitThread
RtlUnwind
HeapSize
HeapReAlloc
HeapDestroy
GetLocaleInfoA
GetUserDefaultLangID
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
GetLastError
FreeLibrary
GetCurrentProcessId
LCMapStringA
HeapCreate
VirtualFree
ExitProcess
SetStdHandle
GetFileType
SetHandleCount
GetConsoleCP
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
QueryPerformanceCounter
GetStringTypeA
GetConsoleOutputCP
LocalFree
GetFileTime
user32
GetSystemMenu
UnregisterClassA
PostMessageA
GetWindow
ExitWindowsEx
EnumChildWindows
wsprintfA
CharNextA
MessageBeep
CreateWindowExA
ClientToScreen
GetSystemMetrics
LoadImageA
SendMessageA
PostQuitMessage
GetWindowRect
MoveWindow
MessageBoxA
RemoveMenu
DrawMenuBar
DestroyWindow
IsWindow
ShowWindow
LoadIconA
advapi32
LookupPrivilegeValueA
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
AdjustTokenPrivileges
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
SetEntriesInAclA
FreeSid
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CreateProcessAsUserW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemRealloc
CLSIDFromProgID
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoInitialize
OleRun
CoTaskMemFree
oleaut32
GetErrorInfo
VariantInit
SysAllocString
SysFreeString
VarUI4FromStr
shlwapi
StrToIntA
PathFileExistsW
PathFileExistsA
PathAppendA
PathRemoveFileSpecA
SHDeleteKeyA
comctl32
InitCommonControlsEx
_TrackMouseEvent
netapi32
Netbios
Sections
.text Size: 380KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ